From c5c1a0eecca3f0bf5df0b0edea2b147f9e6faaee Mon Sep 17 00:00:00 2001 From: Miek Gieben Date: Thu, 15 Sep 2011 20:13:21 +0200 Subject: [PATCH] start with nsec3 proving --- nsec3.go | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) diff --git a/nsec3.go b/nsec3.go index 7a1a1c07..a072e8dd 100644 --- a/nsec3.go +++ b/nsec3.go @@ -5,6 +5,7 @@ import ( "hash" "strings" "crypto/sha1" + "os" ) type saltWireFmt struct { @@ -57,3 +58,18 @@ func (nsec3 *RR_NSEC3) HashNames() { nsec3.Header().Name = HashName(nsec3.Header().Name, int(nsec3.Hash), int(nsec3.Iterations), nsec3.Salt) nsec3.NextDomain = HashName(nsec3.NextDomain, int(nsec3.Hash), int(nsec3.Iterations), nsec3.Salt) } + +// NsecVerify verifies the negative response (NXDOMAIN/NODATA) in +// the message m. +// NsecVerify returns nil when the NSECs in the message contain +// the correct proof. This function does not validates the NSECs +func (m *Msg) NsecVerify(q Question) os.Error { + + return nil +} + +// Nsec3Verify verifies ... +func (m *Msg) Nsec3Verify(q Question) os.Error { + + return nil +}